Md Amiruzzaman, M. Abdullah-Al-Wadud, Yoojin Chung
{"title":"An Analysis of Syndrome Coding","authors":"Md Amiruzzaman, M. Abdullah-Al-Wadud, Yoojin Chung","doi":"10.1007/978-3-642-13365-7_5","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_5","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126293596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication","authors":"Muhammad Asif Khan, F. Kausar, A. Masood","doi":"10.1007/978-3-642-13365-7_19","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_19","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"335 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122101445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Syed Noor-ul-Hassan Shirazi, Muhammad Asim, M. Irfan, N. Ikram
{"title":"MPLS Unleashed: Remedy Using IPSEC over MPLS VPN","authors":"Syed Noor-ul-Hassan Shirazi, Muhammad Asim, M. Irfan, N. Ikram","doi":"10.1007/978-3-642-13365-7_24","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_24","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129884151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed A. Alhabeeb, A. Almuhaideb, P. D. Le, B. Srinivasan
{"title":"A New Holistic Security Approach for Government Critical Systems: Flooding Prevention","authors":"Mohammed A. Alhabeeb, A. Almuhaideb, P. D. Le, B. Srinivasan","doi":"10.1007/978-3-642-13365-7_25","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_25","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128920327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Video Streaming in Vehicular Adhoc Network","authors":"Aneel Rahim, Z. Khan, F. B. Muhaya","doi":"10.1007/978-3-642-13365-7_21","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_21","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"1974 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130229750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Isaza, A. Castillo, Marcelo López, L. Castillo, Manuel López
{"title":"Intrusion Correlation Using Ontologies and Multi-agent Systems","authors":"G. Isaza, A. Castillo, Marcelo López, L. Castillo, Manuel López","doi":"10.1007/978-3-642-13365-7_6","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_6","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123867718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Risks of Cloud Computing and Its Emergence as 5th Utility Service","authors":"Mushtaq Ahmad","doi":"10.1007/978-3-642-13365-7_20","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_20","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116574760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection","authors":"R. Wu, Keisuke Seki, Ryusuke Sakamoto, M. Hisada","doi":"10.1007/978-3-642-13365-7_27","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_27","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122222142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pattern Recognition Using Artificial Neural Network: A Review","authors":"Tai-hoon Kim","doi":"10.1007/978-3-642-13365-7_14","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_14","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124259685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network","authors":"Syed Sherjeel A. Gilani, M. Zubair, Z. Khan","doi":"10.1007/978-3-642-13365-7_22","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_22","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122858991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}